Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 May 2015 17:46:26 +0000 (UTC)
From:      Xin LI <delphij@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r387746 - head/security/vuxml
Message-ID:  <201505281746.t4SHkQ3Z056911@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: delphij
Date: Thu May 28 17:46:26 2015
New Revision: 387746
URL: https://svnweb.freebsd.org/changeset/ports/387746

Log:
  Document krb5 requires_preauth bypass in PKINIT-enabled KDC.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu May 28 17:01:05 2015	(r387745)
+++ head/security/vuxml/vuln.xml	Thu May 28 17:46:26 2015	(r387746)
@@ -57,6 +57,41 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="406636fe-055d-11e5-aab1-d050996490d0">
+    <topic>krb5 -- requires_preauth bypass in PKINIT-enabled KDC</topic>
+    <affects>
+      <package>
+	<name>krb5</name>
+	<range><lt>1.13.2</lt></range>
+      </package>
+      <package>
+	<name>krb5-112</name>
+	<range><lt>1.12.3_2</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>MIT reports:</p>
+	<blockquote cite="http://krbdev.mit.edu/rt/Ticket/Display.html?id=8160">;
+	  <p>In MIT krb5 1.12 and later, when the KDC is configured
+	    with PKINIT support, an unauthenticated remote attacker
+	    can bypass the requires_preauth flag on a client principal
+	    and obtain a ciphertext encrypted in the principal's
+	    long-term key.  This ciphertext could be used to conduct
+	    an off-line dictionary attack against the user's password.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2015-2694</cvename>
+      <url>http://krbdev.mit.edu/rt/Ticket/Display.html?id=8160</url>;
+    </references>
+    <dates>
+      <discovery>2015-05-25</discovery>
+      <entry>2015-05-28</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="27f742f6-03f4-11e5-aab1-d050996490d0">
     <topic>cURL -- sensitive HTTP server headers also sent to proxies</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201505281746.t4SHkQ3Z056911>